This may be one of the most crooked things that’s ever happened in the history of American politics.
It is well-known that the CIA is the most politicized intelligence organization out of all the federal agencies — and the newly-revealed “UMBRAGE” program proves just that.
This program was publicized by Wikileaks on Thursday after releasing thousands of documents from within the CIA, calling it “Vault 7.”
Through the UMBRAGE program, the CIA can penetrate different networks, replicating the hacking methods of others across the world — and all of this leaves a “fingerprint.”
Now, apply this new information to the recent outrage and controversy surrounding Donald Trump and Russia — then the entire picture is clear as day.
The CIA hacked into DNC and leaked the emails. The CIA used the same hacking method Russians use in order to penetrate the DNC. The DNC saw that the hacks were carried out by “Russians.” Then, the DNC places the blame on Donald Trump, framing him as some sort of “Russian stooge.”
Here’s what Wikileaks says about the program:
“The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a “fingerprint” that can be used by forensic investigators to attribute multiple different attacks to the same entity.
“This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
“The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ‘stolen’ from malware produced in other states including the Russian Federation.
“With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the “fingerprints” of the groups that the attack techniques were stolen from.
“UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.”
SHARE on Facebook and Twitter and get the truth out about the destructive CIA!